Call: +44 (0)7759 277220 Call
PeteFinnigan.com Limited Products, Services, Training and Information
Features

PFCLATK Features

PeteFinnigan.com Limited have developed an audit trail product that can be used to rapidly deploy an audit trail to an Oracle database. The toolkit is alert and policy driven and uses standard features of the database. It comes with 28 policies that includes 28 pre-defined alerts. The whole ethos of the toolkit was to allow customers to be able to define an audit trail for the Oracle database easily and quickly that adds value. The audit trail policies that are shipped are aimed at auditing the database engine itself with the goal of capturing any attack of the database itself.

Customers can easily define their own policies, alerts and factors. This makes the toolkit easy to expand and use. The policies can target both standard audit and also trigger based audit. Policies can be defined to audit data access and functional access as well. The toolkit is rich and its main goal is to be easy to deploy quickly and get meaningful audit trails.

This is a fast and simple way to get a comprehensive audit trail in your database using our toolkit and expertise. The toolkit also goes much further as it supports adaptive audit and adaptive security as well as a black box flight recorder as well as scoring for the database as a whole and also scoring of alerts generated.

PFCLATK supports the following features and more:
  • Detect SQL Injection : We can detect SQL Injection attacks in multiple ways.
  • Privilege Escalation : We can detect privilege escalation in a number of ways.
  • User events : PFCLATK can detect password guessing based on a person doing it or scripted. We also can detect user security changes inclusing profiles.
  • Detect different use and access :We can detect access as named users, access to schemas, access as developers and support staff and access as admin/privileges users and capture activity.
  • Suspicious activity : The product can detect different types of suspicious activity such as out of hours, location based, sharing based and more.
  • Zero day : We can detect what could be zero day attacks.
  • Changes to Security : Any changes to security can be detected.
  • Structural Changes : Changes to the structure of the database can be detected.
  • External : Any access to external interfaces or changes to external interfaces can be detected.
  • System Rights : Any use of system rights is captured.
  • Audit Trail : Changes to the audit trails or access to the audit trails is caught.